As a 20-year provider of proprietary software for the enterprise market, Novell has built products and a culture around proprietary (or closed) software. Within the last 18 months, we have embraced open source development and Linux and have injected them into our corporate DNA. While different, the two approaches are not mutually exclusive. In fact, I would argue embracing open source as a proprietary company is more straightforward than an open source company trying to move "up the stack." In this talk I will examine the myths, challenges, and opportunities for companies attempting to understand the best of both worlds.

Alan F. Nugent serves as chief technology officer of Novell. Prior to Novell, Alan was the Managing Partner, Technology, at Palladian Partners. Mr. Nugent has successfully led many different technology organizations. He serves on the Board of Directors and on the Technical Committee for the Object Management Group and is a widely respected writer and speaker on OT, BPR, and Information Management. He sits on the board of directors of several technology startup companies.

In the evolution of computers and networks, we have developed complex
mechanisms to manage one, the other, or both. We organize teams based
on technology or task, only to find that the tools they use converge at times
and then diverge again. I'll discuss the latest convergences in the
context of distributed systems management, network management, security,
and voice in a world of ISPs, ASPs, Web services. It all boils down to
this: why can't we manage the network just like one large UNIX box?

Eliot Lear started his career developing distributed management tools
for UNIX in 1987 at Rutgers University. From 1991 through 1998 he was
part of a team that ran a large computer manufacturer network. Since
1998, Eliot has been the Corporate Irritant of Cisco Systems, focusing
on the area of network management, network applications, and cross-functional integration.

10:00 a.m.10:30 a.m. Break

10:30 a.m.12:00 p.m.

Tuesday

GENERAL SESSION PAPERS

Overlays in Practice
Session Chair: Fred Douglis, IBM Research

Awarded Best Paper!Handling Churn in a DHT
Sean Rhea and Dennis Geels, University of California, Berkeley; Timothy Roscoe, Intel
Research, Berkeley; John Kubiatowicz, University of California, Berkeley

Short, pithy, and fun, Work-in-Progress reports introduce interesting
new or ongoing work. If you have work you would like to share or a cool
idea that's not quite ready for publication, send a one- to
two-page summary (in PDF format) to usenix04wips@usenix.org. We are particularly
interested in presenting students' work. A schedule of presentations
will be posted at the conference, and the speakers will be notified in
advance. Work-in-Progress reports are five-minute presentations; the
time limit will be strictly enforced.

All security decisions involve trade-offs: how much security you get, and
what you give up to get it. When we decide whether to walk down a dimly
lit street, purchase a home burglar alarm system, or implement an airline
passenger profiling system, we're making a security trade-off. Everyone
makes these trade-offs all the time. It's intuitive and natural, and
fundamental to being alive. But paradoxically, people are astonishingly
bad at making rational decisions about these trade-offs.

Security expert Bruce Schneier discusses this notion of security trade-offs
and how we are all "security consumers." He makes use of a five-step
process to explicate these intuitive trade-offs and shows how the process
can be applied to decisions both small and large. Learn how security works
in the real world, and what you can do to get the security you want . . .
not the security that is forced upon you.

Internationally renowned security expert Bruce Schneier has written eight
books, including Beyond Fear and Secrets and Lies, as well as the Blowfish
and Twofish encryption algorithms. Schneier has appeared on numerous
television and radio programs, has testified before Congress, and is a
frequent writer and lecturer on issues surrounding security and privacy.